Hacker News new | past | comments | ask | show | jobs | submit login

It's more like in the 90s and 2000s software-exploit based attacks were fairly easy. These days you have to adopt and use logical,social and configuration vulnerabilities that have always been common as well.



Imagine the damage those ransomware people could have done back then.. Whole countries were open for disruption.


Given that Morris Worm is 30 years old and we keep using UNIX derived OSes, those ransomware people have plenty of opportunities still.


But surely there are a much smaller number of Unix computers running sendmail these days? And sendmail is a lot more secure now than it was 30 years ago. Doesn't seem like a fair comparison IMHO...


Enjoy the Google talks from Linux Kernel Summit 2018.

https://www.youtube.com/watch?v=XfNt6MsLj0E&list=PLbzoR-pLrL...

68% of Linux kernel exploits in 2018 were caused by C's lack of features to handle memory corruption.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: